Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 16.957917] ================================================================== [ 16.957991] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 16.958043] Write of size 8 at addr fff00000c635ad71 by task kunit_try_catch/177 [ 16.958091] [ 16.958122] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.958200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.958224] Hardware name: linux,dummy-virt (DT) [ 16.958253] Call trace: [ 16.958274] show_stack+0x20/0x38 (C) [ 16.958409] dump_stack_lvl+0x8c/0xd0 [ 16.958454] print_report+0x118/0x608 [ 16.958513] kasan_report+0xdc/0x128 [ 16.958557] kasan_check_range+0x100/0x1a8 [ 16.958602] __asan_memset+0x34/0x78 [ 16.958685] kmalloc_oob_memset_8+0x150/0x2f8 [ 16.958786] kunit_try_run_case+0x170/0x3f0 [ 16.958957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.959016] kthread+0x328/0x630 [ 16.959054] ret_from_fork+0x10/0x20 [ 16.959100] [ 16.959117] Allocated by task 177: [ 16.959167] kasan_save_stack+0x3c/0x68 [ 16.959209] kasan_save_track+0x20/0x40 [ 16.959244] kasan_save_alloc_info+0x40/0x58 [ 16.959283] __kasan_kmalloc+0xd4/0xd8 [ 16.959318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.959479] kmalloc_oob_memset_8+0xb0/0x2f8 [ 16.959660] kunit_try_run_case+0x170/0x3f0 [ 16.959831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.959954] kthread+0x328/0x630 [ 16.960053] ret_from_fork+0x10/0x20 [ 16.960163] [ 16.960183] The buggy address belongs to the object at fff00000c635ad00 [ 16.960183] which belongs to the cache kmalloc-128 of size 128 [ 16.960250] The buggy address is located 113 bytes inside of [ 16.960250] allocated 120-byte region [fff00000c635ad00, fff00000c635ad78) [ 16.960310] [ 16.960329] The buggy address belongs to the physical page: [ 16.960358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.960408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.960527] page_type: f5(slab) [ 16.960703] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.960818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.960957] page dumped because: kasan: bad access detected [ 16.961015] [ 16.961033] Memory state around the buggy address: [ 16.961196] fff00000c635ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.961309] fff00000c635ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.961497] >fff00000c635ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.961665] ^ [ 16.961751] fff00000c635ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.961890] fff00000c635ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.961927] ==================================================================
[ 16.908616] ================================================================== [ 16.908674] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 16.908723] Write of size 8 at addr fff00000c63cdc71 by task kunit_try_catch/177 [ 16.908770] [ 16.908802] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.908880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.908904] Hardware name: linux,dummy-virt (DT) [ 16.908945] Call trace: [ 16.908966] show_stack+0x20/0x38 (C) [ 16.909012] dump_stack_lvl+0x8c/0xd0 [ 16.909061] print_report+0x118/0x608 [ 16.909297] kasan_report+0xdc/0x128 [ 16.909382] kasan_check_range+0x100/0x1a8 [ 16.909427] __asan_memset+0x34/0x78 [ 16.909468] kmalloc_oob_memset_8+0x150/0x2f8 [ 16.910389] kunit_try_run_case+0x170/0x3f0 [ 16.910546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.910763] kthread+0x328/0x630 [ 16.910805] ret_from_fork+0x10/0x20 [ 16.910851] [ 16.910869] Allocated by task 177: [ 16.910896] kasan_save_stack+0x3c/0x68 [ 16.910948] kasan_save_track+0x20/0x40 [ 16.910984] kasan_save_alloc_info+0x40/0x58 [ 16.911034] __kasan_kmalloc+0xd4/0xd8 [ 16.911070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.911408] kmalloc_oob_memset_8+0xb0/0x2f8 [ 16.911466] kunit_try_run_case+0x170/0x3f0 [ 16.911503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.911774] kthread+0x328/0x630 [ 16.911876] ret_from_fork+0x10/0x20 [ 16.912187] [ 16.912211] The buggy address belongs to the object at fff00000c63cdc00 [ 16.912211] which belongs to the cache kmalloc-128 of size 128 [ 16.912269] The buggy address is located 113 bytes inside of [ 16.912269] allocated 120-byte region [fff00000c63cdc00, fff00000c63cdc78) [ 16.912330] [ 16.912356] The buggy address belongs to the physical page: [ 16.912494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd [ 16.912609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.912672] page_type: f5(slab) [ 16.912731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.912779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.912844] page dumped because: kasan: bad access detected [ 16.912875] [ 16.912892] Memory state around the buggy address: [ 16.913203] fff00000c63cdb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.913660] fff00000c63cdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.913737] >fff00000c63cdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.913774] ^ [ 16.913813] fff00000c63cdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.913855] fff00000c63cdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.913892] ==================================================================
[ 13.485715] ================================================================== [ 13.486152] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330 [ 13.486652] Write of size 8 at addr ffff88810254d371 by task kunit_try_catch/194 [ 13.487172] [ 13.487392] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.487568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.487590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.487635] Call Trace: [ 13.487660] <TASK> [ 13.487684] dump_stack_lvl+0x73/0xb0 [ 13.487741] print_report+0xd1/0x650 [ 13.487780] ? __virt_addr_valid+0x1db/0x2d0 [ 13.487817] ? kmalloc_oob_memset_8+0x166/0x330 [ 13.487850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.487892] ? kmalloc_oob_memset_8+0x166/0x330 [ 13.487931] kasan_report+0x141/0x180 [ 13.487968] ? kmalloc_oob_memset_8+0x166/0x330 [ 13.488004] kasan_check_range+0x10c/0x1c0 [ 13.488031] __asan_memset+0x27/0x50 [ 13.488054] kmalloc_oob_memset_8+0x166/0x330 [ 13.488080] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 13.488106] ? __schedule+0x10cc/0x2b60 [ 13.488137] ? __pfx_read_tsc+0x10/0x10 [ 13.488162] ? ktime_get_ts64+0x86/0x230 [ 13.488197] kunit_try_run_case+0x1a5/0x480 [ 13.488232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.488266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.488445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.488521] ? __kthread_parkme+0x82/0x180 [ 13.488592] ? preempt_count_sub+0x50/0x80 [ 13.488643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.488677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.488711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.488742] kthread+0x337/0x6f0 [ 13.488773] ? trace_preempt_on+0x20/0xc0 [ 13.488812] ? __pfx_kthread+0x10/0x10 [ 13.488844] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.488880] ? calculate_sigpending+0x7b/0xa0 [ 13.488920] ? __pfx_kthread+0x10/0x10 [ 13.488955] ret_from_fork+0x116/0x1d0 [ 13.488982] ? __pfx_kthread+0x10/0x10 [ 13.489013] ret_from_fork_asm+0x1a/0x30 [ 13.489065] </TASK> [ 13.489088] [ 13.499943] Allocated by task 194: [ 13.500279] kasan_save_stack+0x45/0x70 [ 13.500603] kasan_save_track+0x18/0x40 [ 13.500755] kasan_save_alloc_info+0x3b/0x50 [ 13.500905] __kasan_kmalloc+0xb7/0xc0 [ 13.501051] __kmalloc_cache_noprof+0x189/0x420 [ 13.501864] kmalloc_oob_memset_8+0xac/0x330 [ 13.502275] kunit_try_run_case+0x1a5/0x480 [ 13.502757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.503168] kthread+0x337/0x6f0 [ 13.503323] ret_from_fork+0x116/0x1d0 [ 13.503485] ret_from_fork_asm+0x1a/0x30 [ 13.503985] [ 13.504171] The buggy address belongs to the object at ffff88810254d300 [ 13.504171] which belongs to the cache kmalloc-128 of size 128 [ 13.504771] The buggy address is located 113 bytes inside of [ 13.504771] allocated 120-byte region [ffff88810254d300, ffff88810254d378) [ 13.505442] [ 13.505610] The buggy address belongs to the physical page: [ 13.505929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d [ 13.506302] flags: 0x200000000000000(node=0|zone=2) [ 13.506544] page_type: f5(slab) [ 13.507163] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.507877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.508219] page dumped because: kasan: bad access detected [ 13.508642] [ 13.508823] Memory state around the buggy address: [ 13.509059] ffff88810254d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.509345] ffff88810254d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.509859] >ffff88810254d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.510285] ^ [ 13.511027] ffff88810254d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.511449] ffff88810254d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.511924] ==================================================================
[ 13.648663] ================================================================== [ 13.649369] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330 [ 13.649791] Write of size 8 at addr ffff8881031c0071 by task kunit_try_catch/193 [ 13.650074] [ 13.650216] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.650261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.650273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.650294] Call Trace: [ 13.650306] <TASK> [ 13.650321] dump_stack_lvl+0x73/0xb0 [ 13.650350] print_report+0xd1/0x650 [ 13.650373] ? __virt_addr_valid+0x1db/0x2d0 [ 13.650398] ? kmalloc_oob_memset_8+0x166/0x330 [ 13.650420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.650447] ? kmalloc_oob_memset_8+0x166/0x330 [ 13.650493] kasan_report+0x141/0x180 [ 13.650515] ? kmalloc_oob_memset_8+0x166/0x330 [ 13.650542] kasan_check_range+0x10c/0x1c0 [ 13.650566] __asan_memset+0x27/0x50 [ 13.650585] kmalloc_oob_memset_8+0x166/0x330 [ 13.650608] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 13.650631] ? __schedule+0x10cc/0x2b60 [ 13.650653] ? __pfx_read_tsc+0x10/0x10 [ 13.650675] ? ktime_get_ts64+0x86/0x230 [ 13.650700] kunit_try_run_case+0x1a5/0x480 [ 13.650757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.650779] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.650803] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.650825] ? __kthread_parkme+0x82/0x180 [ 13.650846] ? preempt_count_sub+0x50/0x80 [ 13.650870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.650893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.650915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.650938] kthread+0x337/0x6f0 [ 13.650958] ? trace_preempt_on+0x20/0xc0 [ 13.650982] ? __pfx_kthread+0x10/0x10 [ 13.651022] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.651043] ? calculate_sigpending+0x7b/0xa0 [ 13.651078] ? __pfx_kthread+0x10/0x10 [ 13.651100] ret_from_fork+0x116/0x1d0 [ 13.651119] ? __pfx_kthread+0x10/0x10 [ 13.651140] ret_from_fork_asm+0x1a/0x30 [ 13.651172] </TASK> [ 13.651183] [ 13.659411] Allocated by task 193: [ 13.659608] kasan_save_stack+0x45/0x70 [ 13.659799] kasan_save_track+0x18/0x40 [ 13.660067] kasan_save_alloc_info+0x3b/0x50 [ 13.660268] __kasan_kmalloc+0xb7/0xc0 [ 13.660501] __kmalloc_cache_noprof+0x189/0x420 [ 13.660725] kmalloc_oob_memset_8+0xac/0x330 [ 13.660941] kunit_try_run_case+0x1a5/0x480 [ 13.661417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.661619] kthread+0x337/0x6f0 [ 13.661746] ret_from_fork+0x116/0x1d0 [ 13.661883] ret_from_fork_asm+0x1a/0x30 [ 13.662220] [ 13.662324] The buggy address belongs to the object at ffff8881031c0000 [ 13.662324] which belongs to the cache kmalloc-128 of size 128 [ 13.662722] The buggy address is located 113 bytes inside of [ 13.662722] allocated 120-byte region [ffff8881031c0000, ffff8881031c0078) [ 13.663306] [ 13.663415] The buggy address belongs to the physical page: [ 13.663672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0 [ 13.664123] flags: 0x200000000000000(node=0|zone=2) [ 13.664413] page_type: f5(slab) [ 13.664634] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.665089] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.665364] page dumped because: kasan: bad access detected [ 13.665697] [ 13.665889] Memory state around the buggy address: [ 13.666145] ffff8881031bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.666450] ffff8881031bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.666776] >ffff8881031c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.667037] ^ [ 13.667299] ffff8881031c0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.667653] ffff8881031c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.667944] ==================================================================
[ 25.787909] ================================================================== [ 25.799236] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330 [ 25.806464] Write of size 8 at addr ffff88810133d471 by task kunit_try_catch/217 [ 25.813864] [ 25.815377] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 25.815386] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 25.815389] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.815392] Call Trace: [ 25.815394] <TASK> [ 25.815396] dump_stack_lvl+0x73/0xb0 [ 25.815400] print_report+0xd1/0x650 [ 25.815404] ? __virt_addr_valid+0x1db/0x2d0 [ 25.815408] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.815412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.815417] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.815421] kasan_report+0x141/0x180 [ 25.815425] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.815430] kasan_check_range+0x10c/0x1c0 [ 25.815434] __asan_memset+0x27/0x50 [ 25.815437] kmalloc_oob_memset_8+0x166/0x330 [ 25.815441] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 25.815445] ? __schedule+0x10cc/0x2b60 [ 25.815449] ? ktime_get_ts64+0x83/0x230 [ 25.815454] kunit_try_run_case+0x1a2/0x480 [ 25.815458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.815462] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.815466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.815471] ? __kthread_parkme+0x82/0x180 [ 25.815474] ? preempt_count_sub+0x50/0x80 [ 25.815478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.815483] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.815487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.815491] kthread+0x334/0x6f0 [ 25.815494] ? trace_preempt_on+0x20/0xc0 [ 25.815498] ? __pfx_kthread+0x10/0x10 [ 25.815502] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.815505] ? calculate_sigpending+0x7b/0xa0 [ 25.815510] ? __pfx_kthread+0x10/0x10 [ 25.815514] ret_from_fork+0x113/0x1d0 [ 25.815517] ? __pfx_kthread+0x10/0x10 [ 25.815520] ret_from_fork_asm+0x1a/0x30 [ 25.815526] </TASK> [ 25.815528] [ 25.984751] Allocated by task 217: [ 25.988159] kasan_save_stack+0x45/0x70 [ 25.991997] kasan_save_track+0x18/0x40 [ 25.995837] kasan_save_alloc_info+0x3b/0x50 [ 26.000110] __kasan_kmalloc+0xb7/0xc0 [ 26.003863] __kmalloc_cache_noprof+0x189/0x420 [ 26.008416] kmalloc_oob_memset_8+0xac/0x330 [ 26.012695] kunit_try_run_case+0x1a2/0x480 [ 26.016887] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.022288] kthread+0x334/0x6f0 [ 26.025519] ret_from_fork+0x113/0x1d0 [ 26.029272] ret_from_fork_asm+0x1a/0x30 [ 26.033198] [ 26.034698] The buggy address belongs to the object at ffff88810133d400 [ 26.034698] which belongs to the cache kmalloc-128 of size 128 [ 26.047212] The buggy address is located 113 bytes inside of [ 26.047212] allocated 120-byte region [ffff88810133d400, ffff88810133d478) [ 26.059815] [ 26.061313] The buggy address belongs to the physical page: [ 26.066921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d [ 26.074921] flags: 0x200000000000000(node=0|zone=2) [ 26.079800] page_type: f5(slab) [ 26.082947] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 26.090684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.098423] page dumped because: kasan: bad access detected [ 26.103996] [ 26.105495] Memory state around the buggy address: [ 26.110289] ffff88810133d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.117510] ffff88810133d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.124738] >ffff88810133d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.131965] ^ [ 26.139097] ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.146317] ffff88810133d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.153568] ==================================================================